LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 07-01-2015, 06:47 PM   #16
JaseP
Senior Member
 
Registered: Jun 2002
Location: Eastern PA, USA
Distribution: K/Ubuntu 18.04-14.04, Scientific Linux 6.3-6.4, Android-x86, Pretty much all distros at one point...
Posts: 1,802

Rep: Reputation: 157Reputation: 157

If you want to monitor traffic to/from a machine,... You are essentially going to have to "Man-in-the-middle" yourself on your network and do some packet inspection (more effective from a machine monitoring traffic to/from your router). If you wanted to inspect packets from the machine, and suspected foul play, you couldn't trust the machine enough to run, say... WireShark, on it and expect that you're catching all the traffic (although it'd have to be a pretty good hack job to renumber your packet IDs on the fly, well enough that you couldn't catch it).

The following explains how you could capture traffic to/from a mobile device:
https://wiki.wireshark.org/CaptureSetup/WLAN
 
Old 07-01-2015, 07:11 PM   #17
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
I'm confused. Where does the linked site say that the intercepting device playing the role of the man in the middle can be mobile, in other words a second smartphone or pad? The operating systems mentioned in the site are desktop ones.

Maybe carrying a linux laptop with a 3G card and wifi is the only safe way to intercept or monitor smartphone wifi transmissions going to the internet. Maybe a netbook that takes a 3G card and BSD.
 
Old 07-02-2015, 12:46 AM   #18
JaseP
Senior Member
 
Registered: Jun 2002
Location: Eastern PA, USA
Distribution: K/Ubuntu 18.04-14.04, Scientific Linux 6.3-6.4, Android-x86, Pretty much all distros at one point...
Posts: 1,802

Rep: Reputation: 157Reputation: 157
It talks about "Monitor Mode" in the article.

Here's more about it...

https://ask.wireshark.org/questions/...nother-machine

Beyond using WireShark, you might consider looking to see if your router is set to capture logs of the IP addresses it connects to. If you know your device's IP within the NAT (typically; 192.168.0.XXXX, where XXXX is the device's assigned IP), you can look to see what it connected to. Then do an IP look-up on those external addresses...
 
Old 07-02-2015, 05:34 AM   #19
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
So you're recommending monitoring a pad or smartphone using a desktop pc or laptop right? If so, why not just use your pc or laptop that you trust?

We want to use a mobile device when mobile, how do we monitor that?

Last edited by Ulysses_; 07-02-2015 at 05:38 AM.
 
Old 07-02-2015, 01:47 PM   #20
JaseP
Senior Member
 
Registered: Jun 2002
Location: Eastern PA, USA
Distribution: K/Ubuntu 18.04-14.04, Scientific Linux 6.3-6.4, Android-x86, Pretty much all distros at one point...
Posts: 1,802

Rep: Reputation: 157Reputation: 157
I don't know of any mobile equivalent to WireShark. If you want to know what traffic is being sent, you are going to need to monitor it from somewhere. That means a PC set up to observe the traffic to/from the device you are using (and something like WireShark's "monitor" function). If you don't see anything that looks like what you fear is being sent,... then you can "safely" take off your tin foil hat...

Keep in mind that Mobile devices are going to transmit data/voice over their cell chipset, in addition to wifi/BT... And cell signals can be compromised in all sorts of ways (very insecure,... or, more appropriately; "Security through obscurity."). That's why Richard Stallman doesn't use a cell phone...

Bottom line is that unless all your traffic is being sent encrypted, then you can safely assume it's being intercepted by the NSA, et al. Even if it is being encrypted, they're still capturing it,... They just probably don't care enough about you to bother decrypting it.
 
1 members found this post helpful.
Old 07-02-2015, 03:19 PM   #21
ntubski
Senior Member
 
Registered: Nov 2005
Distribution: Debian, Arch
Posts: 3,781

Rep: Reputation: 2081Reputation: 2081Reputation: 2081Reputation: 2081Reputation: 2081Reputation: 2081Reputation: 2081Reputation: 2081Reputation: 2081Reputation: 2081Reputation: 2081
Quote:
Originally Posted by Ulysses_ View Post
Isn't it suspicious that the best understood architecture in the world is never or almost never used on smartphones?
The x86 instruction set is pretty horrible, it has all sorts of useless backward compat instructions that are hardly used, ASCII Adjust After Addition and a bunch of other BCD instructions, the old (80 bit!) floating point instructions, and variable length instruction encoding which makes disassembly much more difficult (of course it makes the decoding and executing more difficult as well).

http://www.utd.edu/~hamlen/wartell-pkdd11.pdf

Quote:
x86 permits interleaving of code and static data within a section and
uses variable-length, unaligned instruction encodings. This trades
simplicity for brevity and speed, since more common instructions can
be assigned shorter encodings by architecture designers. An
unfortunate consequence, however, is that hidden instructions can be
concealed within x86 binaries by including jump instructions that
target the interior of another instruction's encoding, or that target
bytes that resemble data. This causes these bytes to be interpreted as
code at runtime, executing code that does not appear in the
disassembly. Malicious code is therefore much easier to conceal in x86
binaries than in other formats.
 
1 members found this post helpful.
Old 07-02-2015, 04:28 PM   #22
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Just found that you can build a modified android from the sources with something like this:

https://wiki.cyanogenmod.org/w/Build_for_jflte

In case of spying features hidden in the chips, how about having two smartphones:

- one with the cellphone antenna ripped out and only wifi working, and

- the other set up as a gateway from wifi to GSM/3G and as a monitoring device (someone must have ported wireshark to android or ported similar monitoring software).

And instead of using the browser, use a VNC connection to your PC at home, over the internet, going through the monitoring smartphone.

Then spying chips in smartphone 1 sending traffic to third parties will be revealed by smartphone 2.

Last edited by Ulysses_; 07-02-2015 at 04:32 PM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] Linux ltsp client failing to boot. After ubuntu splash screen, it dumps me to busybox abhishekgit Ubuntu 5 07-28-2014 11:30 AM
Sending Same Command To all Windows in screen on linux devangjani Linux - Software 4 07-05-2010 12:56 PM
What is the best way to find out what caused a bunch of core dumps? abefroman Linux - Server 1 10-24-2009 08:33 PM
Screen Dumps Nay_Nay Linux - Newbie 6 07-06-2005 10:27 AM
Taking screen dumps. How? robson8112 Linux - General 1 01-11-2004 09:29 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:57 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration